CVE-2021-22946
29.09.2021, 20:15
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.Enginsight
Vendor | Product | Version |
---|---|---|
haxx | curl | 7.20.0 ≤ 𝑥 < 7.79.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
netapp | cloud_backup | - |
netapp | clustered_data_ontap | - |
netapp | oncommand_insight | - |
netapp | oncommand_workflow_automation | - |
netapp | snapcenter | - |
netapp | h300s_firmware | - |
netapp | h500s_firmware | - |
netapp | h700s_firmware | - |
netapp | h300e_firmware | - |
netapp | h500e_firmware | - |
netapp | h700e_firmware | - |
netapp | h410s_firmware | - |
netapp | solidfire_baseboard_management_controller_firmware | - |
oracle | communications_cloud_native_core_binding_support_function | 1.11.0 |
oracle | communications_cloud_native_core_network_function_cloud_native_environment | 1.10.0 |
oracle | communications_cloud_native_core_network_repository_function | 1.15.0 |
oracle | communications_cloud_native_core_network_repository_function | 1.15.1 |
oracle | communications_cloud_native_core_network_slice_selection_function | 1.8.0 |
oracle | communications_cloud_native_core_service_communication_proxy | 1.15.0 |
oracle | mysql_server | 5.7.0 ≤ 𝑥 ≤ 5.7.35 |
oracle | mysql_server | 8.0.0 ≤ 𝑥 ≤ 8.0.26 |
oracle | peoplesoft_enterprise_peopletools | 8.57 |
oracle | peoplesoft_enterprise_peopletools | 8.58 |
oracle | peoplesoft_enterprise_peopletools | 8.59 |
apple | macos | 𝑥 < 12.3 |
siemens | sinec_infrastructure_network_services | 𝑥 < 1.0.1.1 |
oracle | commerce_guided_search | 11.3.2 |
oracle | communications_cloud_native_core_binding_support_function | 22.1.3 |
oracle | communications_cloud_native_core_console | 22.2.0 |
oracle | communications_cloud_native_core_network_repository_function | 22.1.0 |
oracle | communications_cloud_native_core_network_repository_function | 22.2.0 |
oracle | communications_cloud_native_core_security_edge_protection_proxy | 22.1.1 |
splunk | universal_forwarder | 8.2.0 ≤ 𝑥 < 8.2.12 |
splunk | universal_forwarder | 9.0.0 ≤ 𝑥 < 9.0.6 |
splunk | universal_forwarder | 9.1.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-325 - Missing Cryptographic StepThe product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
- CWE-319 - Cleartext Transmission of Sensitive InformationThe software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
References